Home / Blog / All Blog Posts

Alert Logic Blogs 

The Top 8 Data Security Best Practices to Protect Against a Successful Breach

The Top 8 Data Security Best Practices to Protect Against a Successful Breach

Proactively evaluating and improving your existing cybersecurity strategy based on a comprehensive approach across pre-breach and post-breach risks can significantly reduce your likelihood of being affected by cybercrime. Here are 8 data security best practices that can significantly reduce the likelihood of a successful attack and minimize the impact of those that are successful.

Why Vulnerability Management is Important

Why Vulnerability Management is Important

An organization must stay ahead with a solid vulnerability management program early in the game. If you don’t, you may end up with unmanageable risks and forcing you to make even more expensive decisions down the road.

Should You Invest in a SOC?

Should You Invest in a SOC?

The benefits of a SOC are numerous; however, building a SOC is costly in both time and expense. Learn about the process involved with building a SOC or choosing a managed security services solution.

Vulnerability Management in the Cloud: A Fresh Approach

Vulnerability Management in the Cloud: A Fresh Approach

Whether you are running a server under your desk or have hundreds of servers at data centers around the world, you know that you need to make sure your data and applications are protected from hackers trying to exploit known vulnerabilities.

Where is IPv1, 2, 3,and 5?

Where is IPv1, 2, 3,and 5?

Discover the evolution of Internet Protocols with a focus on ipv2 and its predecessor, ipv1. Learn about their roles in network communication.

Review of Htaccess Attacks

There has been a lot of excitement around the new htaccess authentication bypass tool called HTExploit (HiperText Access Exploit [1]). This tool abuses a very old attack made possible due to a common htaccess configuration issue. Being an industry that loves to name...

Discovering Modern CSRF Patch Failures

Cross-site request forgery (CSRF/XSRF) vulnerabilities allow an attacker to perform authenticated actions without authenticating as the user.

Ready to Protect Your Company with Alert Logic?